Paper Destruction DST shall shred all paper waste containing Fund Data and dispose in a secure and confidential manner making it unrecoverable.
Substantial Destruction Any damage or destruction to the Premises or the Building which Landlord is not obligated to repair pursuant to Subparagraph 20(a) above will be deemed a substantial destruction. In the event of a substantial destruction, Landlord may elect to either (i) repair, reconstruct and restore the portion of the Building or the Premises damaged by such casualty, in which case this Lease will continue in full force and effect, subject to Tenant's termination right contained in Subparagraph 20(d) below; or (ii) terminate this Lease effective as of the date which is thirty (30) days after Tenant's receipt of Landlord's election to so terminate.
Provision and Removal of Equipment B2.1 The Contractor shall provide all the Equipment necessary for the supply of the Services.
Loss or Destruction of Warrant Subject to the terms and conditions hereof, upon receipt by the Company of evidence reasonably satisfactory to it of the loss, theft, destruction or mutilation of this Warrant and, in the case of loss, theft or destruction, of such bond or indemnification as the Company may reasonably require, and, in the case of such mutilation, upon surrender and cancellation of this Warrant, the Company will execute and deliver a new Warrant of like tenor.
Loss or Destruction Upon receipt of evidence satisfactory to the Company of the loss, theft, destruction, or mutilation of this Warrant Certificate and, in the case of any such loss, theft or destruction, upon delivery of an indemnity agreement or bond satisfactory in form, substance and amount to the Company or, in the case of any such mutilation, upon surrender and cancellation of this Warrant Certificate, the Company at its expense will execute and deliver, in lieu thereof, a new Warrant Certificate of like tenor.
Termination and Data Destruction Upon Project Close-out, the Requester and Approved Users agree to destroy all copies, versions, and Data Derivatives of the dataset(s) retrieved from NIH-designated controlled-access databases, on both local servers and hardware, and if cloud computing was used, delete the data and cloud images from cloud computing provider storage, virtual and physical machines, databases, and random access archives, in accord with the NIH Security Best Practices for Controlled-Access Data Subject to the NIH Genomic Data Sharing (GDS) Policy. However, the Requester may retain these data as necessary to comply with any institutional policies (e.g., scientific data retention policy), law, and scientific transparency expectations for disseminated research results, and/or journal policies. A Requester who retains data for any of these purposes continues to be a xxxxxxx of the data and is responsible for the management of the retained data in accordance with the NIH Security Best Practices for ControlledAccess Data Subject to the NIH Genomic Data Sharing (GDS) Policy, and any institutional policies. Any retained data may only be used by the PI and Requester to support the findings (e.g., validation) resulting from the research described in the DAR that was submitted by the Requester and approved by NIH. The data may not be used to answer any additional research questions, even if they are within the scope of the approved Data Access Request, unless the Requester submits a new DAR and is approved by NIH to conduct the additional research. If a Requester retains data for any of these purposes, the relevant portions of Terms 4, 5, 6, 7, 8, and 12 remain in effect after termination of this Data Use Certification Agreement. These terms remain in effect until the data is destroyed.
Confidential Destruction PHI COUNTY discloses to CONTRACTOR or 5 CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must be disposed of 6 through confidential means, such as cross cut shredding and pulverizing.
Data Destruction When no longer needed, all County PHI or PI must be cleared, purged, or destroyed consistent with NIST Special Publication 800-88, Guidelines for Media Sanitization such that the PHI or PI cannot be retrieved.
Iro Removal Termination 1. Xxxxx-JCA and IRO. If Xxxxx-JCA terminates an IRO or an IRO withdraws from the engagement during the term of the IA, Xxxxx-JCA must submit a notice explaining its reasons for termination or the reason for withdrawal to OIG no later than 30 days after termination or withdrawal. Xxxxx-JCA must engage a new IRO in accordance with Paragraph A of this Appendix and within 60 days of termination or withdrawal of an IRO.
REMOVAL OF RECORDS FROM PREMISES Where performance of the Contract involves use by the Contractor (or the Contractor’s subsidiaries, affiliates, partners, agents or subcontractors) of Authorized User owned or licensed papers, files, computer disks or other electronic storage devices, data or records at Authorized User facilities or offices, or via remote access, the Contractor (or the Contractor’s subsidiaries, affiliates, partners, agents or subcontractors) shall not remotely access, modify, delete, copy or remove such Records without the prior written approval of the Authorized User. In no case, with or without the written approval of the Authorized User, can the Authorized User data be accessed, moved or sent outside the continental United States.